How to measure usable security: Natural strategies in voting protocols
W Jamroga, D Kurpiewski… - Journal of Computer …, 2022 - content.iospress.com
Journal of Computer Security, 2022•content.iospress.com
Formal analysis of security is often focused on the technological side of the system. One
implicitly assumes that the users will behave in the right way to preserve the relevant
security properties. In real life, this cannot be taken for granted. In particular, security
mechanisms that are difficult and costly to use are often ignored by the users, and do not
really defend the system against possible attacks.
implicitly assumes that the users will behave in the right way to preserve the relevant
security properties. In real life, this cannot be taken for granted. In particular, security
mechanisms that are difficult and costly to use are often ignored by the users, and do not
really defend the system against possible attacks.
Abstract
Formal analysis of security is often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the relevant security properties. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks.
content.iospress.com